Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
Recommendations
Cited in
(only showing first 100 items - show all)- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- The structured design of cryptographically good s-boxes
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator
- Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- Latin squares over Abelian groups
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- Group theoretic properties of Rijndael-like ciphers
- Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation
- One-time pads cannot be used to improve the efficiency of quantum communication
- A new random number generator from permutation groups
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Analysis and improvement of a hash-based image encryption algorithm
- A chaotic block cipher algorithm for image cryptosystems
- Cascade ciphers: The importance of being first
- Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor
- Communication-Based on Topology Preservation of Chaotic Dynamics
- Use of chaotic dynamical systems in cryptography
- Hyperchaotic encryption based on multi-scroll piecewise linear systems
- Decrypting classical cipher text using Markov chain Monte Carlo
- A secure image encryption algorithm based on Rubik's cube principle
- Cartesian authentication codes from functions with optimal nonlinearity.
- Resource requirements of private quantum channels and consequences for oblivious remote state preparation
- On functional specification of Latin squares
- A novel algorithm for image encryption based on mixture of chaotic maps
- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
- Secure communication systems based on the synchronization of chaotic systems
- Meet-in-the-middle attacks on reduced-round XTEA
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
- On cross-correlation indicators of an S-box
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- Chaos-based cryptograph incorporated with \(S\)-box algebraic operation
- Symmetry of information and one-way functions
- The iterated random permutation problem with applications to cascade encryption
- Breaking a chaotic image encryption algorithm based on perceptron model
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Quantum privacy and quantum wiretap channels
- A formal analysis of information disclosure in data exchange
- An information-theoretic model for steganography
- Multiple usage of random bits in finite automata
- 3D: A Three-Dimensional Block Cipher
- (Secure) linear network coding multicast
- CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS
- Combinatorial bounds and characterizations of splitting authentication codes
- A note on two classes of Boolean functions with optimal algebraic immunity
- A secure image cryptosystem via multiple chaotic maps
- A quantum key distribution routing scheme for hybrid-trusted QKD network system
- Construction of recursive MDS matrices using DLS matrices
- Security of public key encryption technique based on multiple chaotic systems
- Optimal symmetric ternary quantum encryption schemes
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Multi-party quantum secret sharing with the single-particle quantum state to encode the information
- A new discrete chaotic map based on the composition of permutations
- Fault-tolerant authenticated quantum dialogue using logical Bell states
- REVISITING Xor-IMPLICATIONS: CLASSES OF FUZZY (CO)IMPLICATIONS BASED ON f-Xor (f-XNor) CONNECTIVES
- Privacy protection in on-line shopping for electronic documents
- A novel keyed parallel hashing scheme based on a new chaotic system
- One-time pad as a nonlinear dynamical system
- Markovian and non-Markovian quantum measurements
- Chaotic hash function based on circular shifts with variable parameters
- Continuous-variable quantum key distribution protocols with eight-state discrete modulation
- Towards a general construction of recursive MDS diffusion layers
- Improvement of information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- A parallel encryption algorithm based on piecewise linear chaotic map
- Using quantum key distribution for cryptographic purposes: a survey
- On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity
- Public-key encryption with chaos
- An improved chaotic cryptosystem with external key
- Estimation of characteristics of randomized static models of data (entropy-robust approach)
- Universal codes as a basis for time series testing
- Image encryption using \(q\)-deformed logistic map
- An image encryption scheme based on quantum logistic map
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- A novel heuristic method for obtaining \(S\)-boxes
- A layered broadcast cryptographic system
- Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels
- A block cipher based on a suitable use of the chaotic standard map
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Logistic map as a block encryption algorithm
- An efficient quantum private comparison of equality over collective-noise channels
- Fast Correlation Attacks: Methods and Countermeasures
- Quantum authentication with key recycling
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Nonlinearities of S-boxes
- Probabilistic encryption
- A new chaotic algorithm for image encryption
- Image encryption with chaotically coupled chaotic maps
- Algebraic nonlinearity and its applications to cryptography
- A method for designing dynamical S-boxes based on discretized chaotic map
- A novel method for designing S-boxes based on chaotic maps
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- Comment on: ``Three-party quantum secure direct communication based on GHZ states
- Conditionally-perfect secrecy and a provably-secure randomized cipher
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)